Threats, Vulnerabilities, and Mitigations Flashcards
(84 cards)
A group of hackers is carrying out cyberattacks against a corporation to expose unethical business practices. Which attribute best describes this type of actor?
A. Financially motivated
B. Highly organized with unlimited resources
C. Driven by ideological or political goals
D. Typically operates within an organization
Answer: C. Driven by ideological or political goals
Explanation: Hacktivists are motivated by political or ideological beliefs and use hacking to promote their cause, often targeting corporations, governments, or organizations they oppose.
A cybersecurity team has detected a highly sophisticated and prolonged cyberattack on a government agency. The attackers used custom malware, zero-day exploits, and stealthy persistence tactics. Based on these characteristics, which type of threat actor is most likely responsible?
A. Script kiddie
B. Hacktivist
C. Insider threat
D. Nation-state actor
Answer: D. Insider threat
✅ Correct: Insider threats originate from within an organization and can have deep knowledge of internal systems. A highly skilled insider, such as a rogue administrator, could deploy advanced malware and exploit zero-day vulnerabilities to maintain persistence in a network.
❌ Incorrect Answers:
A. Script kiddie: Script kiddies lack technical expertise and typically use pre-built hacking tools without understanding how they work.
B. Hacktivist: Hacktivists are motivated by political or ideological causes but usually lack the sophistication required for long-term persistence in a network.
C. Nation-state actor: While nation-state actors are highly skilled and well-funded, the question specifies an insider as the likely source of the attack, meaning the threat originates from within the organization.
A state-sponsored hacking group targets another country’s power grid, causing widespread outages. What is the MOST LIKELY motivation?
A. Financial gain
B. War
C. Ethical hacking
D. Disruption/Chaos
Answer: B. War
✅ Correct: Cyberattacks on critical infrastructure are commonly linked to geopolitical conflicts.
❌ Incorrect Answers:
A. Financial gain: The goal is disruption, not profit.
C. Ethical hacking: Ethical hacking aims to improve security, not cause harm.
D. Disruption/Chaos: While disruption occurs, the broader goal is warfare.
A phishing email convinces an employee to download a malicious attachment that installs keylogging software on their system. Which attack surface and threat vector were exploited?
A. Email and removable device
B. Email and file
C. Message and voice call
D. Instant Messaging (IM) and image
Answer: B. Email and file
✅ Correct: The attack surface is email, as it was used to deliver the threat. The threat vector is a malicious file attachment.
❌ Incorrect Answers:
A. Email and removable device: The attack did not involve external media such as USB drives.
C. Message and voice call: The attack was carried out via email, not voice calls.
D. Instant Messaging (IM) and image: The exploit involved email and a file attachment, not an image sent through IM.
A security operations center (SOC) detects unusual outbound traffic from an internal server to an unknown IP address. A forensic analysis reveals that an attacker exploited a remote code execution vulnerability in a legacy database application running on an end-of-life (EoL) operating system. The attacker exfiltrated sensitive records before establishing persistence via a secondary compromised system. Given these findings, which of the following security risks contributed MOST to the success of this attack?
A. Failure to enforce network segmentation
B. Use of unsupported systems and applications
C. Misconfigured access control lists (ACLs)
D. Presence of open service ports on internet-facing systems
Answer: B. Use of unsupported systems and applications
✅ Correct: The legacy operating system and database application were no longer receiving security patches, making them prime targets for exploitation. The attacker leveraged an unpatched vulnerability to gain initial access and establish persistence.
❌ Incorrect Answers:
A. Failure to enforce network segmentation: While segmentation could reduce lateral movement, it would not prevent the initial compromise caused by an unpatched system.
C. Misconfigured access control lists (ACLs): ACLs control network traffic but do not address unpatched software vulnerabilities.
D. Presence of open service ports on internet-facing systems: The attack originated from within the network, not from an external-facing open port.
A cybersecurity audit reveals that a financial institution has dozens of servers with default manufacturer credentials still in place. Further investigation shows that an unauthorized actor successfully logged into one of these servers using publicly available credentials and modified configurations to create persistent access. Additionally, the attacker deployed a hidden process that exfiltrates customer records at random intervals to avoid detection. Based on this scenario, which TWO security vulnerabilities MOST likely contributed to this breach? (Select TWO)
A. Default credentials
B. Supply chain attack
C. Open service ports
D. Client-based vulnerability
E. Misconfigured security controls
Answer: A. Default credentials and E. Misconfigured security controls
✅ Correct:
A. Default credentials: The attacker was able to log into the server using publicly available manufacturer credentials, which should have been changed upon deployment.
E. Misconfigured security controls: The attacker modified system configurations to establish persistent access, indicating that proper hardening measures were not enforced.
❌ Incorrect Answers:
B. Supply chain attack: No evidence of tampering with the hardware/software supply chain is present.
C. Open service ports: While open ports can expose services, the attacker gained access using default credentials, not an exposed port.
D. Client-based vulnerability: The attack targeted a server, not client-side software.
An attacker intercepts network traffic between an employee’s laptop and the corporate network by exploiting a misconfigured wireless access point. The attacker is able to inject malicious payloads into unencrypted HTTP sessions and redirect traffic to a credential-harvesting page disguised as the company’s login portal. The attacker then uses the stolen credentials to access an internal system and escalate privileges. Which THREE security weaknesses enabled this attack?
A. Unsecure network configuration
B. Unsupported legacy authentication mechanisms
C. Failure to enforce transport encryption
D. Use of a compromised supply chain vendor
E. Client-based software vulnerability
Answer: A. Unsecure network configuration, B. Unsupported legacy authentication mechanisms, and C. Failure to enforce transport encryption
✅ Correct:
A. Unsecure network configuration: The misconfigured wireless access point allowed the attacker to intercept and manipulate network traffic.
B. Unsupported legacy authentication mechanisms: The use of outdated or non-secure authentication methods likely contributed to privilege escalation.
C. Failure to enforce transport encryption: The attacker injected malicious payloads into unencrypted HTTP sessions, which should have been secured using TLS encryption.
❌ Incorrect Answers:
D. Use of a compromised supply chain vendor: This attack was network-based, not supply chain-related.
E. Client-based software vulnerability: The exploit targeted network security flaws, not client-side application vulnerabilities.
Which of the following attributes is most commonly associated with organized crime threat actors?
A. Short-term, opportunistic attacks
B. Well-structured operations and financial motivation
C. Government sponsorship and long-term persistence
D. Use of unsophisticated tools and techniques
Answer: B. Well-structured operations and financial motivation
Explanation: Organized crime groups are highly structured and focus on financial gain, using methods like ransomware, fraud, and data theft. They are different from nation-state actors, who are government-sponsored.
Which of the following BEST describes an unskilled attacker?
A. Uses publicly available exploit tools without deep knowledge of how they work
B. Targets critical infrastructure for financial gain
C. Develops custom malware to maintain long-term persistence
D. Engages in cyberattacks to promote an ideological cause
Answer: A. Uses publicly available exploit tools without deep knowledge of how they work
✅ Correct: Unskilled attackers, often called script kiddies, rely on automated tools to conduct cyberattacks without truly understanding the underlying techniques.
❌ Incorrect Answers:
B. Targets critical infrastructure for financial gain: This describes an organized crime group that seeks monetary gain.
C. Develops custom malware to maintain long-term persistence: This is a hallmark of nation-state actors or APTs (Advanced Persistent Threats).
D. Engages in cyberattacks to promote an ideological cause: This describes hacktivists, who act for political or social reasons.
A group of cybercriminals breaches a corporation’s network and leaks confidential trade secrets online, hoping to damage the company’s reputation. What is the MOST LIKELY motivation?
A. Financial gain
B. Espionage
C. Revenge
D. War
Answer: C. Revenge
✅ Correct: The goal of damaging a company’s reputation suggests retaliation.
❌ Incorrect Answers:
A. Financial gain: No monetary incentive is mentioned.
B. Espionage: There is no evidence of theft for a competitor.
D. War: This attack does not target military objectives.
During a forensic investigation, an analyst finds an infected workstation communicating with an external IP address over port 443. The source of the infection was an employee who downloaded an Excel file sent via an instant messaging app. The file contained a hidden macro that executed PowerShell commands. Which two attack surfaces and vectors were MOST LIKELY exploited? (Select TWO)
A. Removable device
B. Instant Messaging (IM)
C. File
D. Voice Call
Answer: B. Instant Messaging (IM) and C. File
✅ Correct:
IM (B) was the attack surface, as the malware was delivered via an instant messaging platform.
File (C) was the threat vector, as the attacker embedded a malicious macro in an Excel document.
❌ Incorrect Answers:
A. Removable device: The malware was not introduced via USB or external storage.
D. Voice Call: The attack did not involve social engineering via phone.
A software development company contracts a third-party vendor to provide cloud-based storage for its application data. Six months later, the company discovers that attackers exploited a vulnerability in the vendor’s infrastructure to gain unauthorized access to the stored data. The breach exposed confidential customer records, including personally identifiable information (PII). Which of the following would have BEST mitigated this supply chain risk?
A. Segmenting vendor systems from internal production environments
B. Encrypting stored data using a client-managed encryption key
C. Restricting third-party vendor access to corporate networks
D. Blocking all non-essential inbound and outbound network traffic
Answer: B. Encrypting stored data using a client-managed encryption key
✅ Correct: If the company had encrypted data before sending it to the vendor, even if the vendor was compromised, attackers would not be able to decrypt the stolen information.
❌ Incorrect Answers:
A. Segmenting vendor systems from internal production environments: While useful, segmentation would not prevent an attacker from accessing vendor-stored data.
C. Restricting third-party vendor access to corporate networks: This helps reduce direct access risks, but the attack occurred on the vendor’s infrastructure, not within the corporate network.
D. Blocking all non-essential inbound and outbound network traffic: While firewalls help, they would not prevent data theft from a compromised third-party vendor.
A red team conducts a penetration test on a corporate network and successfully accesses a database server without triggering any security alerts. The red team achieved this by inserting malicious firmware into a router that was intercepted during shipment. This firmware enabled remote access for the attacker, allowing them to pivot inside the network undetected. What attack vector was used in this scenario?
A. Open service ports
B. Wired network attack
C. Supply chain compromise
D. Client-based exploit
Answer: C. Supply chain compromise
✅ Correct: The attackers tampered with networking hardware before it was deployed, allowing them to establish unauthorized remote access.
❌ Incorrect Answers:
A. Open service ports: The compromise did not involve an externally exposed open port.
B. Wired network attack: While the attack allowed access to a wired network, the entry point was a compromised device, not the network infrastructure itself.
D. Client-based exploit: The attack targeted network hardware, not software installed on an endpoint.
A security analyst is investigating multiple reports from employees who received emails that appeared to be from the company’s finance department. The emails requested urgent invoice payments and contained a link to a website that looked identical to the company’s internal payment portal. Employees who entered their credentials were redirected to an “error” page, but their login information was captured. Which TWO social engineering techniques were MOST LIKELY used in this attack?
A. Business Email Compromise (BEC)
B. Watering Hole Attack
C. Brand Impersonation
D. Misinformation/Disinformation
E. Pretexting
Answer: A. Business Email Compromise (BEC) and C. Brand Impersonation
✅ Correct:
A. Business Email Compromise (BEC): The attacker used a fraudulent email appearing to come from the finance department to manipulate employees into taking action.
C. Brand Impersonation: The attacker created a fake version of the company’s payment portal, leveraging trust in the company’s brand to deceive users.
❌ Incorrect Answers:
B. Watering Hole Attack: The attacker did not compromise a website frequently visited by the target.
D. Misinformation/Disinformation: This technique spreads false information but does not involve credential harvesting.
E. Pretexting: While similar to BEC, this attack relied more on brand impersonation than a detailed backstory (pretexting).
A senior executive receives a phone call from someone claiming to be from the company’s IT help desk. The caller states that urgent security updates are required and asks the executive to provide their login credentials over the phone to verify their identity. The phone number appears to originate from the IT department. What attack method is being used?
A. Vishing
B. Smishing
C. Typosquatting
D. Watering Hole Attack
Answer: A. Vishing
✅ Correct: Vishing (voice phishing) uses phone calls to deceive targets into providing sensitive information. The attacker likely used VoIP spoofing to make the call appear legitimate.
❌ Incorrect Answers:
B. Smishing: Smishing involves SMS-based phishing, not phone calls.
C. Typosquatting: Typosquatting involves fake websites with slight URL variations, not phone calls.
D. Watering Hole Attack: This attack targets websites, not phone interactions.
A cybersecurity team detects a surge in visitors to an external website known to be frequently accessed by employees for industry news. Further analysis reveals that a threat actor injected malicious JavaScript into the website, causing malware to be downloaded when visited by employees using company credentials. What type of attack is being executed?
A. Pretexting
B. Watering Hole Attack
C. Smishing
D. Typosquatting
Answer: B. Watering Hole Attack
✅ Correct: The attacker compromised a trusted website frequently visited by the target audience and injected malicious code to infect users who accessed it.
❌ Incorrect Answers:
A. Pretexting: No false scenario was used to manipulate individuals into revealing information.
C. Smishing: SMS (text messaging) was not involved.
D. Typosquatting: The attack did not involve a fake domain or a misspelled URL.
Which attribute best describes the difference between an insider threat and an external threat actor?
A. Access to organizational resources and data
B. Use of ransomware for financial gain
C. Lack of technical expertise and reliance on public tools
D. Limited knowledge of company systems
Answer: A. Access to organizational resources and data
Explanation: Insider threats originate from within an organization and have access to internal systems and sensitive data, making them particularly dangerous. They may act out of malice, negligence, or coercion.
Which of the following statements BEST describes hacktivists?
A. They conduct cyberattacks for financial gain
B. They are always well-funded and work in structured groups
C. They act based on ideological, political, or activist motivations
D. They are primarily insiders who misuse company data for profit
Answer: C. They act based on ideological, political, or activist motivations
✅ Correct: Hacktivists conduct cyberattacks to promote causes they believe in, often targeting governments or corporations they view as unethical.
❌ Incorrect Answers:
A. They conduct cyberattacks for financial gain: Financial motivation is more common for organized crime groups rather than hacktivists.
B. They are always well-funded and work in structured groups: Hacktivists vary widely in resources; some work alone, while others have support.
D. They are primarily insiders who misuse company data for profit: This describes an insider threat, not a hacktivist.
A hacker gains access to a CEO’s private emails and threatens to release them unless a payment is made. What is the PRIMARY motivation?
A. Service disruption
B. Philosophical beliefs
C. Blackmail
D. Revenge
Answer: C. Blackmail
✅ Correct: Blackmail involves coercion, often using stolen data to force victims into compliance.
❌ Incorrect Answers:
A. Service disruption: The goal is coercion, not denial of service.
B. Philosophical beliefs: No ideological intent is present.
D. Revenge: The attacker seeks payment, not retribution.
During a forensic investigation, analysts find that several employees were redirected to a fraudulent login page after receiving a text message stating their accounts were suspended due to “suspicious activity.” The fake login page captured usernames and passwords before forwarding the victims to the real website. Which attack technique was used?
A. Typosquatting
B. Smishing
C. Brand Impersonation
D. Misinformation/Disinformation
Answer: B. Smishing
✅ Correct: The attacker used SMS-based phishing (smishing) to deceive victims into clicking a malicious link and entering their credentials.
❌ Incorrect Answers:
A. Typosquatting: Typosquatting relies on misspelled domains, but this attack used a direct text message link.
C. Brand Impersonation: While the attacker may have mimicked a trusted brand, the primary method was SMS phishing (smishing).
D. Misinformation/Disinformation: The attacker did not spread false information to manipulate users, but instead used a fraudulent link.
A company employee receives an email that appears to come from their coworker’s legitimate business account. The email requests an urgent transfer of company funds to an external account. The employee, believing the request to be authentic, wires the money without further verification. Which attack technique was used?
A. Phishing
B. Business Email Compromise (BEC)
C. Watering Hole Attack
D. Impersonation
Answer: B. Business Email Compromise (BEC)
✅ Correct: In BEC attacks, threat actors compromise or spoof legitimate business emails to trick employees into authorizing fraudulent transactions.
❌ Incorrect Answers:
A. Phishing: While this shares characteristics with phishing, BEC is more targeted and specific in nature.
C. Watering Hole Attack: No website was compromised in this attack.
D. Impersonation: While BEC may involve impersonation, the key technique here is email compromise.
A security team notices multiple login attempts from geographically dispersed locations on a corporate portal. An investigation reveals that multiple employees unknowingly accessed a fraudulent login page that looked identical to the real site. The fraudulent page was hosted on a domain that used a slight misspelling of the company’s actual website. What attack technique was used?
A. Phishing
B. Typosquatting
C. Pretexting
D. Misinformation/Disinformation
Answer: B. Typosquatting
✅ Correct: Typosquatting relies on users mistyping a legitimate URL, leading them to a fraudulent website controlled by the attacker.
❌ Incorrect Answers:
A. Phishing: While this attack involves deception, the main vector was a misleading domain name.
C. Pretexting: Pretexting involves a false backstory, which is not present in this attack.
D. Misinformation/Disinformation: The attacker did not spread false narratives, only misleading URLs.
An attacker claims to be a high-level executive and calls a company’s accounting department, demanding urgent approval for a wire transfer. The attacker uses intimidation and urgency, threatening severe consequences if the request is delayed. The accounting employee, fearing repercussions, transfers the requested funds without proper verification. Which psychological manipulation technique was MOST LIKELY used?
A. Scarcity
B. Familiarity
C. Intimidation
D. Consensus
Answer: C. Intimidation
✅ Correct: The attacker used authority and fear tactics to pressure the employee into making an unverified financial transaction.
❌ Incorrect Answers:
A. Scarcity: Scarcity manipulates users by creating a sense of limited availability, which does not apply here.
B. Familiarity: Familiarity relies on building trust, whereas this attack relied on fear and urgency.
D. Consensus: Consensus exploits the belief that “everyone else is doing it,” which was not present here.
A script kiddie is primarily characterized by which of the following attributes?
A. High level of technical expertise
B. Use of pre-built hacking tools without deep understanding
C. Advanced persistent threat (APT) tactics
D. Well-funded and highly organized operations
Answer: B. Use of pre-built hacking tools without deep understanding
Explanation: Script kiddies lack technical skills and use publicly available hacking tools, often without fully understanding how they work. They typically seek attention or engage in cyberattacks for fun.